Secure Multi-Party Computation. The outcomes of this project will enhance information protection which is crucial fore rapidly growing e-commerce service and strengthen national safeguard capability of our digital systems and infrastructure. It will contribute to maintain Australia's leading position in the telecommunication and information industries. It will contribute to the quality of our culture by protecting individual's privacy and providing security for sensitive data.
Structures and Protocols for Inference. The proposed research is expected to lead to increased adoption and efficiency of use of machine learning technologies. It will develop new and better ways to use existing machine learning software in a manner that allows easier integration into commercial products. It will increase the competitiveness of Australian industry.
Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and la ....Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and language independent in an Internet-wide context. Using Web services and message queuing, this project also aims to develop a robust middleware infrastructure consisting of a set of tools and programming libraries to ease the development of verifiable P2P applications on heterogeneous platforms.Read moreRead less
Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be ....Semantic Authentication of Visual Data. Data authentication systems can detect the smallest modification to a message. Authentication systems for media objects such as images, and audio and video clips have a different requirement they must ensure authenticity of the content without needing all the changes to be detectable. The aims of this project are to develop a framework for design and analysis of image and video authentication systems, and construct secure and flexible systems that can be used in practice. This research addresses the urgent need of providing security for multimedia objects in electronic commerce and is of high importance to the acceptance of advanced communication and information services.Read moreRead less